Oracle.Java.JPEGImage.Memory.Corruption

description-logoDescription

This indicates an attack attempt against a Memory Corruption vulnerability in Oracle Java.
The vulnerability is due to an error when the vulnerable software handles a maliciously crafted Java file. An attacker can exploit this by tricking an unsuspecting user into visiting a webpage containing a malicious Java applet and execute arbitrary code within the context of the application.

affected-products-logoAffected Products

Oracle Java Runtime Environment (JRE) 5.0 Update 41 and earlier
Oracle Java Runtime Environment (JRE) 6 Update 43 and earlier
Oracle Java Runtime Environment (JRE) 7 Update 17 and earlier
OpenJDK IcedTea IcedTea6 Prior to 1.11.10
OpenJDK IcedTea IcedTea6 Prior to 1.12.5
OpenJDK IcedTea IcedTea7 Prior to 2.3.9

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the vendor.
http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)